In the Linux kernel, the following vulnerability has been resolved:
mISDN: Fix a use after free in hfcmulti_tx()
Don't dereference *sp after calling dev_kfree_skb(*sp).
References
Configurations
Configuration 1 (hide)
|
History
10 Sep 2024, 18:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/4d8b642985ae24f4b3656438eb8489834a17bb80 - Patch | |
References | () https://git.kernel.org/stable/c/61ab751451f5ebd0b98e02276a44e23a10110402 - Patch | |
References | () https://git.kernel.org/stable/c/70db2c84631f50e02e6b32b543700699dd395803 - Patch | |
References | () https://git.kernel.org/stable/c/7e4a539bca7d8d20f2c5d93c18cce8ef77cd78e0 - Patch | |
References | () https://git.kernel.org/stable/c/8f4030277dfb9dbe04fd78566b19931097c9d629 - Patch | |
References | () https://git.kernel.org/stable/c/9460ac3dd1ae033bc2b021a458fb535a0c36ddb2 - Patch | |
References | () https://git.kernel.org/stable/c/d3e4d4a98c5629ccdcb762a0ff6c82ba9738a0c3 - Patch | |
References | () https://git.kernel.org/stable/c/ddc79556641ee070d36be0de4a1f0a16a71f1fc7 - Patch |
19 Aug 2024, 12:59
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Aug 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Aug 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-17 09:15
Updated : 2024-09-10 18:43
NVD link : CVE-2024-42280
Mitre link : CVE-2024-42280
CVE.ORG link : CVE-2024-42280
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free